[go: up one dir, main page]

TWI745368B - Lockset with integrated wireless signals analysis feature and method - Google Patents

Lockset with integrated wireless signals analysis feature and method Download PDF

Info

Publication number
TWI745368B
TWI745368B TW106113083A TW106113083A TWI745368B TW I745368 B TWI745368 B TW I745368B TW 106113083 A TW106113083 A TW 106113083A TW 106113083 A TW106113083 A TW 106113083A TW I745368 B TWI745368 B TW I745368B
Authority
TW
Taiwan
Prior art keywords
devices
list
proximity
unknown
user
Prior art date
Application number
TW106113083A
Other languages
Chinese (zh)
Other versions
TW201742977A (en
Inventor
特洛伊 布朗
Original Assignee
美商品譜公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 美商品譜公司 filed Critical 美商品譜公司
Publication of TW201742977A publication Critical patent/TW201742977A/en
Application granted granted Critical
Publication of TWI745368B publication Critical patent/TWI745368B/en

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/0001Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/06Involving synchronization or resynchronization between transmitter and receiver; reordering of codes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/63Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)
  • Selective Calling Equipment (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A wireless lockset with integrated wireless signals analysis and method is described herein. The analysis integrated into the wireless lockset allows remote monitoring of a building or dwelling. A user can track and be notified of the state of occupancy of a dwelling based upon when specific un-associated devices that are within range of the lockset.

Description

具有整合無線訊號分析特徵與方法之鎖具Lock with integrated wireless signal analysis feature and method

本發明一般而言係關於鎖定裝置;特定而言,本發明係關於一種用於以無線方式偵測已知裝置及未知裝置之電子鎖定裝置。The present invention generally relates to a locking device; in particular, the present invention relates to an electronic locking device for wirelessly detecting known devices and unknown devices.

電子鎖定系統廣泛用於住宅及商業市場中。在某些情形中,電子鎖控制機械鎖定總成,諸如一鎖栓(deadbolt)在其延伸位置與回縮位置之間的移動。此等鎖定系統藉由需要某些憑證而控制穿過一建築物中之門之進入。此等憑證可包含鑰匙進入類型或無鑰匙進入類型。某些無鑰匙進入類型包含其中一使用者可藉由鍵入一碼而獲得進入之一小鍵盤。在某些情形中,舉例而言,可以無線方式將憑證及/或命令提供至一鎖具,諸如在於2014年3月10日提出申請之針對一「Wireless Lockset With Integrated Antenna, Touch Activation, and Light Communication Method」之美國專利第9,024,759號及於2012年3月8日提出申請之針對一「Wireless Access Control System and Related Methods」之美國預授予公開案第2012/0234058號中所揭示,該兩者皆特此以引用方式併入。 諸多現有電子鎖包含一通知特徵。該通知特徵通常允許當其他使用者操作鎖時(諸如)用一文字訊息、郵件等通知具有管理員特權之一使用者。舉例而言,當一使用者將電子鎖解鎖時,管理員使用者可接收有人操作過該鎖及在某些情形中哪一使用者操作過該鎖之一文字訊息或郵件。 儘管此類型之通知特徵允許受限之遠端監視,但存在數個挑戰。一個挑戰係遠端監視限於其上安裝電子鎖之門。通常,可存在一建築物之諸多入口,且若一使用者穿過並未安裝電子鎖之一入口而進入/退出,則將不會產生任何通知。另一挑戰係現有電子鎖需要與電子鎖配對之裝置(例如,遙控鑰匙(key fob)、智慧型電話應用程式(smartphone app)等)以判定哪一使用者正操作該鎖。Electronic locking systems are widely used in residential and commercial markets. In some cases, the electronic lock controls the movement of a mechanical locking assembly, such as a deadbolt, between its extended and retracted positions. These locking systems control access through a door in a building by requiring certain credentials. These certificates may include key entry types or keyless entry types. Some keyless entry types include a small keyboard in which a user can gain access by typing a code. In some cases, for example, credentials and/or commands can be provided wirelessly to a lock, such as a "Wireless Lockset With Integrated Antenna, Touch Activation, and Light Communication" filed on March 10, 2014. Method" US Patent No. 9,024,759 and the US Pre-Grant Publication No. 2012/0234058 for a "Wireless Access Control System and Related Methods" filed on March 8, 2012, both of which are hereby disclosed Incorporated by reference. Many existing electronic locks include a notification feature. This notification feature usually allows a text message, email, etc. to be used to notify a user with administrator privileges when other users operate the lock. For example, when a user unlocks an electronic lock, the administrator user can receive a text message or email that someone has operated the lock and in some cases which user has operated the lock. Although this type of notification feature allows limited remote monitoring, there are several challenges. One challenge is that remote monitoring is limited to the door on which the electronic lock is installed. Generally, there may be many entrances to a building, and if a user enters/exits through an entrance that is not equipped with an electronic lock, no notification will be generated. Another challenge is that the existing electronic lock requires a device that is paired with the electronic lock (for example, a key fob, a smartphone app, etc.) to determine which user is operating the lock.

根據本發明,提供一種週期性地掃描且分析門鎖硬體系統之特定範圍內之裝置之門鎖系統。在一項例示性實施例中,該門鎖硬體系統可包含一無線電,該無線電週期性地掃描且分析該門鎖硬體系統之一特定範圍內之所有已知裝置及未知裝置。可將所有裝置(已知或未知)指派一識別碼,該識別碼經由一圖形使用者介面而呈現至一使用者。該使用者可調整設定以使用該圖形使用者介面來挑選哪些裝置已被該門鎖硬體系統追蹤。在又一實施例中,該使用者可調整設定以挑選哪些裝置觸發由該門鎖系統向該使用者或另一使用者發出之通知。可回應於對該門鎖硬體之範圍內之裝置(已知或未知)之偵測而觸發其他動作。According to the present invention, a door lock system is provided that periodically scans and analyzes devices within a specific range of the door lock hardware system. In an exemplary embodiment, the door lock hardware system may include a radio that periodically scans and analyzes all known devices and unknown devices within a specific range of the door lock hardware system. All devices (known or unknown) can be assigned an identification code, which is presented to a user via a graphical user interface. The user can adjust the settings to use the graphical user interface to select which devices have been tracked by the door lock hardware system. In another embodiment, the user can adjust the settings to select which devices trigger the notification sent by the door lock system to the user or another user. Other actions can be triggered in response to the detection of devices (known or unknown) within the range of the door lock hardware.

相關申請案 本申請案主張於2016年4月19日提出申請之美國申請案第62/324,484號之優先權,該美國申請案特此以其全文引用方式併入本文中。 本文中所提供之圖及說明可經簡化以圖解說明與對本文中所闡述之裝置、系統及方法之一清晰理解相關之態樣,同時出於清晰之目的,消除可在典型裝置、系統及方法中發現之其他態樣。熟習此項技術者可認識到,其他元件及/或操作可為合意的及/或需要實施本文中所闡述之該等裝置、系統及方法。由於此等元件及操作係此項技術中所眾所周知的,且由於其並不促進對本發明之一較佳理解,因此本文中可不提供對此等元件及操作之一論述。然而,本發明被認為固有地包含將為熟習此項技術者已知之所闡述態樣之所有此等元件、變化形式及修改。 在說明書中對「一項實施例」、「一實施例」、「一說明性實施例」等之提及指示所闡述之實施例可包含一特定特徵、結構或特性,但每一實施例可或可不必包含彼特定特徵、結構或特性。而且,此等片語不必指代同一實施例。此外,當結合一實施例闡述一特定特徵、結構或特性時,應認為:無論是否明確闡述,結合其他實施例實現此特徵、結構或特性係在熟習此項技術者之知識範圍內。另外,應瞭解,包含於一列表中呈「A、B及C中之至少一者」之形式之物項可意指:(A);(B);(C);(A及B);(A及C);(B及C)或(A、B及C)。類似地,以「A、B或C中之至少一者」之形式列示之物項可意指:(A);(B);(C);(A及B);(A及C);(B及C)或(A、B及C)。 在圖式中,可以特定配置及/或次序展示某些結構或方法特徵。然而,應瞭解,可不需要此等特定配置及/或次序。而是,在某些實施例中,可以不同於說明性圖中所展示之方式及/或次序之一方式及/或次序配置此等特徵。另外,在一特定圖中包含一結構或方法特徵並不意味著暗示在所有實施例中皆需要此特徵,以及在某些實施例中可包含此特徵或可與其他特徵組合此特徵。 現在參考圖式且特定而言參考圖1,展示其中一鎖定總成204可根據本發明之一實施例操作之一例示性環境。一典型環境100可包含一單個住宅106。在其他實施例中,該環境可包含彼此緊密接近之多個住宅,諸如一公寓大樓、一或多個排房及/或商業建築物。通常,住宅可包含一個以上通路。舉例而言,住宅106可包含一前門102、一側門104、位於住宅後部中之另一門(未展示)、自一車庫進入之一門(未展示)及/或為住宅106提供入口/出口之其他門。鎖總成204之一個優勢係:其僅需要被安裝於該等門中之一者上,同時監視為住宅106提供入口/出口之其他門。考量其中鎖總成204安裝於前門102上之一實例。雖然一使用者108被展示成使用側門104 (其係並未安裝鎖總成204之一門)離開住宅106,但使用者108仍可在自側門104離開住宅106時被前門102上之鎖定總成204偵測到。如下文所闡述,鎖總成204可藉由以無線方式掃描接近之裝置而偵測使用者,諸如攜帶一無線裝置(例如,一智慧型電話、遙控鑰匙等)之一使用者,該無線裝置係由安裝於前門102上之鎖總成204使用(舉例而言)一整合無線電來進行偵測。出於實例之目的,鎖總成204被展示成安裝於前門102上,但鎖總成204可安裝於住宅106中之任一門上。 現在參考圖2,展示用於同步資訊之一實例性系統組態200。在所展示之實例中,該系統包含一使用者裝置202,該使用者裝置可經由一網路206接收由鎖總成204判定及來自鎖總成204之接近裝置清單資訊。網路206可為熟習此項技術者已知之網路之任一類型,諸如一區域網路或網際網路。鎖總成204可包含一無線通信模組(參見圖7),該無線通信模組透過一所要無線通信協定而促進與使用者裝置202之無線通信。在一另一實施例中,使用者裝置202可使用一個任何所要協定(諸如,Bluetooth™、Zigbee™或Z-wave™)來直接與鎖總成204同步。 現在參考圖3,展示根據本發明之一實施例之用於安裝於一門302上之一實例性電子鎖300,該實例性電子鎖包含一內部底盤304、一可移除蓋306、一手動轉動片308、一螺栓310、一面板312、使用者輸入314、一外部底盤316、機械鎖定總成318及一可移除鑰匙320。內部底盤304可包含用於一整合無線電之電子電路。該整合無線電可具有掃描用於對接近裝置(諸如,智慧型電話、PDA、遙控鑰匙或諸如此類)之偵測之一或多個頻帶之能力。該整合無線電可通常使用藍芽或Wi-Fi來掃描接近裝置。將諸如LED、開關、其他積體電路、天線及其他裝置等額外裝置設計成電子電路。門鎖總成204可安裝於門之外部部分上,安裝於內部上或進行外部安裝/內部安裝之一組合。 圖4係展示針對接近裝置執行一掃描且編譯所偵測裝置之一清單之門硬體之整合無線電之一實例之一經簡化流程圖。在此實例中,方法400以週期性地掃描裝置之方塊402開始。整合無線電可掃描所關注之一頻帶或若干頻帶,且記錄彼相同頻帶中之任何其他無線裝置之獨特簽章。在步驟404中,若並未偵測到任何裝置,則程序在方塊402處重新開始。若偵測到任何裝置,則程序移動至步驟406。在步驟406中,建立裝置之一清單。針對每一裝置,整合無線電可指派一獨特識別碼。亦可以某些特性將每一裝置分類。此等特性可包含但不限於ID、名稱、範圍、偵測時間、停留時間、裝置類型及作業系統。在某些實施例中,系統試圖識別所偵測裝置之儘可能多之特性,尤其在其中一裝置係一未知裝置之例項中。可將該等特性連同該裝置清單一起保存於鎖總成204之一記憶體內。可將裝置清單保存於鎖總成204之該記憶體內達特定時間週期(諸如,24個小時、一週、一個月或諸如此類)以提供所偵測接近裝置之一歷史。亦可將該歷史保存至一雲端伺服器以用於在一稍後時間由使用者裝置202進行存取。在判定該清單之後,程序移動至步驟408,且可將該清單發送至一雲端伺服器以用於使一使用者裝置(諸如,一使用者之智慧型電話)同步。在另一實施例中,當該使用者之裝置進入鎖總成204之特定接近範圍內時,可(諸如)使用一近場通信協定(例如,Bluetooth™等)來使該清單與一使用者之裝置同步。在步驟410中,使用者可在觀看裝置之清單之後決定建立通知,此在下文中結合圖6進一步詳細地闡述。 圖5係展示基於對某些裝置之偵測而被觸發之警報通知之一實例之一經簡化流程圖。在此實例中,方法500以步驟502 (接收裝置清單)開始,該裝置清單可為(舉例而言)圖4之步驟408中所建立之清單。可在一遠端伺服器處或者本端地在鎖總成204本身之硬體內進行接收。在步驟504中,基於由一使用者形成之使用者設定來分析裝置清單,此在下文中接合圖6進一步地詳細闡述。在步驟506中,鎖總成204針對該清單中之每一裝置判定是否應觸發一警報。若並未觸發任何警報,則程序回到開始。若觸發了警報,則程序移動至步驟510且發送適當警報或通知。舉例而言,一使用者可希望在其兒童之行動電話位於鎖總成204之範圍內時被通知。因此,一使用者建立當兒童之裝置在裝置之清單上時被通知之一設定且可接收一適當通知(例如,SMS、text、郵件等)。在另一例示性實施例中,一使用者可選擇每當判定一未知或新的裝置在鎖硬體之範圍內時被通知。一旦判定一未知或新的裝置在清單上,使用者便可相應地被通知(例如,SMS、文字、郵件等)。更進一步地,鎖總成204可與一家庭自動化系統進行通信。因此,當使用者可被通知未知裝置時,亦可將一命令觸發至家庭自動化系統以鎖定所有門/窗戶或甚至關閉一敞開的車庫門。 圖6係自一使用者之視角利用一使用者裝置展示一實例之一經簡化流程圖,該使用者裝置具有直接地或者間接地與鎖總成204相互作用之一軟體應用程式。在此實例中,程序600以步驟602開始且接收一裝置清單,該裝置清單可經由一軟體應用程式或「app」而在使用者之裝置之一螢幕上進行觀看。裝置清單基本上表示特定住宅之居住狀態,諸如在圖1之住宅106之特定範圍內之所有裝置。在步驟604中,使用者可決定更新或建立設定以確立用以在於鎖總成204之特定接近範圍內偵測到裝置時發生之通知及/或警報。若使用者選擇不進行任何改變,則程序移動回至步驟602。若使用者選擇進行改變,則程序移動至步驟606以更新/形成警報。如上文所提及,當某些裝置被判定成在鎖硬體之範圍內時,使用者可選擇接收某些通知(例如,SMS、文字、郵件)。亦可確立其他設定;舉例而言,基於住宅之大小接近範圍成為特定區域,或基於某些所偵測裝置而發送至一家庭自動化系統之命令設定。一旦完成設定,程序便移動至步驟608且保存該等選定警報/通知。在步驟610中,可使該等所保存警報/通知與一雲端伺服器及/或鎖總成204同步。 現在參考圖7,展示用於鎖總成204之一例示性計算環境700之一經簡化方塊圖,門鎖應用程式於其中執行。說明性實施方案700包含一鎖總成204,該鎖總成可經由一或多個網路740而與一或多個其他計算系統或裝置742進行通信。如所展示,鎖總成204包括儲存媒體720。 說明性鎖總成204包含至少一個處理器712 (例如,一微處理器、微控制器、數位訊號處理器等)、記憶體714及一輸入/輸出(I/O)子系統716。儘管並未具體展示,但應理解,I/O子系統716可除其他之外亦包含一I/O控制器、一記憶體控制器及一或多個I/O埠。處理器712及I/O子系統716通信地耦合至記憶體714。記憶體714可經體現為任一類型之適合電腦記憶體裝置(例如,揮發性記憶體,諸如,各種形式之隨機存取記憶體)。 I/O子系統716通信地耦合至若干個組件,該等組件包含一或多個使用者輸入裝置718 (例如,一觸控螢幕、鍵盤、虛擬小鍵盤、麥克風等)、一或多個儲存媒體720、一或多個輸出裝置722 (例如,揚聲器、LED等)、一或多個感測裝置724、726、728、一或多個相機或其他感測器應用程式730 (例如,基於軟體之感測器控制)及一或多個網路介面732。 儲存媒體720可包含一或多個硬碟機或其他適合資料儲存裝置(例如,閃存記憶體、記憶體卡、記憶體棒及/或其他)。在某些實施例中,出於較快處理或其他原因,可在計算裝置710之操作期間將系統軟體之部分(例如,一作業系統等)、框架/中間軟體(例如,API、目的程式庫等),及系統軟體之部分或框架/中間軟體複製至記憶體714。 一或多個網路介面732可將計算裝置710通信地耦合至一網路,舉例而言,諸如一區域網路、廣域網路、個人雲端、企業雲端、公共雲端及/或網際網路。因此,網路介面732可包含一或多個有線或無線網路介面卡或配接器,舉例而言,如可依據特定計算系統700之規格及/或設計而被需要。網路介面732可使用(例如)近場通信(NFC)、無線保真(Wi-Fi)、射頻識別(RFID)、紅外線(IR)或其他適合技術來提供短程無線或光通信能力。進一步地,無線通信可使用Zigbee或Z-Wave協定。 其他計算系統742可經體現為任一適合類型之計算系統或裝置,諸如前述類型之裝置中之任一者或者其他電子裝置或系統。舉例而言,在某些實施例中,其他計算系統742可包含用以儲存儲存媒體720中所儲存之資料之部分之一或多個伺服器電腦。進一步地,計算裝置742可進一步包含應用程式744以為一使用者提供一顯示介面以實施所陳述之本發明之實施例。為清晰說明起見,計算系統700可包含並未在圖7中進行圖解說明之其他組件、子組件及裝置。一般而言,計算系統700之組件藉由電子訊號路徑而通信地耦合(如圖7中所展示),該等電子訊號路徑可經體現為能夠促進各別裝置及組件之間的通信的任一類型之有線或無線訊號路徑。實例 下文提供本文中所揭示的具有整合無線訊號之無線鎖具之說明性實例。無線鎖具之一實施例可包含下文所闡述之實例中之任一者或多者及任一組合。 實例1係包含一種供與一行動裝置配合使用之一電子鎖之系統。該系統包含可在一鎖定位置與一解鎖位置之間移動之一鎖定裝置及具有一整合無線電之一電子鎖。該電子鎖經組態以:針對已知裝置及未知裝置掃描一接近區域,其中該接近區域係該電子鎖之範圍內之一預定義區域;判定該接近區域內之已知裝置及未知裝置之一清單;使已知裝置及未知裝置之該清單與該行動裝置同步;及基於已知裝置及未知裝置之該清單而觸發一或多個警報。 在實例2中,實例1之標的物進一步經組態使得經由網際網路而使該接近裝置清單與該使用者裝置同步。 在實例3中,實例1之標的物進一步經組態使得經由藍芽而使該接近裝置清單與該使用者裝置同步。 在實例4中,實例1之標的物進一步經組態使得該行動裝置經組態以:接收已知裝置及未知裝置之該清單;由該行動裝置之一使用者建立或更新使用者設定,該等使用者設定定義與該等已知裝置及該等未知裝置中之一或多者相關聯之警報或通知。 在實例5中,實例4之標的物進一步經組態使得以一或多個特性將每一裝置分類,該一或多個特性係一ID、名稱、範圍、偵測時間、停留時間、裝置類型及作業系統。 在實例6中,實例5之標的物進一步經組態使得所觸發之該一或多個警報進一步基於該等使用者設定。 在實例7中,實例1之標的物進一步經組態使得將所有所判定之接近裝置儲存於一主清單中達一時間週期。 實例8係一種電子鎖,其包括至少一個處理器及一非暫時性電腦媒體,該非暫時性電腦媒體包括複數個指令,該複數個指令回應於由該至少一個處理器執行而執行以下操作:針對已知裝置及未知裝置掃描一接近區域,其中該接近區域係該電子鎖之範圍內之一預定義區域;判定該接近區域內之已知裝置及未知裝置之一清單;使已知裝置及未知裝置之該清單與該行動裝置同步;及基於已知裝置及未知裝置之該清單而觸發一或多個警報。 在實例9中,實例8之標的物進一步經組態使得經由網際網路而使該接近裝置清單與該使用者裝置同步。 在實例10中,實例8之標的物進一步經組態使得經由藍芽而使該接近裝置清單與該使用者裝置同步。 在實例11中,實例8之標的物進一步經組態使得該等指令在由該處理器執行時進一步執行以下操作:已知裝置及未知裝置之該清單;由該行動裝置之一使用者建立或更新,使用者設定定義與該等已知裝置及該等未知裝置中之一或多者相關聯之警報或通知。 在實例12中,實例11之標的物進一步經組態使得以一或多個特性將每一裝置分類,該一或多個特性係一ID、名稱、範圍、偵測時間、停留時間、裝置類型及作業系統。 在實例13中,實例12之標的物進一步經組態使得所觸發之該一或多個警報進一步基於使用者設定。 在實例14中,實例8之標的物進一步經組態使得將所有所判定之接近裝置儲存於一主清單中達一時間週期。 實例15係一種用於判定接近於一電子鎖之裝置之一清單之方法。該方法包含以下步驟:針對裝置掃描一接近區域,其中該接近區域係該電子鎖之範圍內之一預定義區域;判定該接近區域內之已知裝置及未知裝置之一清單;使已知裝置及未知裝置之該清單與該行動裝置同步;及基於已知裝置及未知裝置之該清單而觸發一或多個警報。 在實例16中,實例15之標的物進一步經組態使得經由網際網路而使該接近裝置清單與該使用者裝置同步。 在實例17中,實例15之標的物進一步經組態使得經由藍芽而使該接近裝置清單與該使用者裝置同步。 在實例18中,實例15之標的物進一步經組態使得該方法包含以下步驟:接收已知裝置及未知裝置之該清單;及由該行動裝置之一使用者建立或更新,使用者設定定義與該等已知裝置及該等未知裝置中之一或多者相關聯之警報或通知。 在實例19中,實例18之標的物進一步經組態使得以一或多個特性將每一裝置分類,該一或多個特性係一ID、名稱、範圍、偵測時間、停留時間、裝置類型及作業系統。 在實例20中,實例19之標的物進一步經組態使得所觸發之該一或多個警報進一步基於使用者設定。 儘管已參考特定構件、材料及實施例闡述了本發明,但熟習此項技術者可自前述說明容易地確定本發明之基本特性且可在不背離如在以下申請專利範圍中陳述的本發明之精神及範疇之情況下作出各種改變及修改以適應各種使用及特性。 Related Applications This application claims the priority of U.S. Application No. 62/324,484 filed on April 19, 2016, which is hereby incorporated by reference in its entirety. The diagrams and descriptions provided in this article can be simplified to illustrate aspects related to a clear understanding of one of the devices, systems, and methods described in this article. At the same time, for the purpose of clarity, the Other aspects found in the method. Those skilled in the art may recognize that other elements and/or operations may be desirable and/or required to implement the devices, systems, and methods described herein. Since these elements and operations are well-known in the art, and because they do not promote a better understanding of the present invention, a discussion of these elements and operations may not be provided in this article. However, the present invention is considered to inherently include all of these elements, variations, and modifications that will be known to those skilled in the art in the described aspects. In the specification, the reference to "an embodiment", "an embodiment", "an illustrative embodiment", etc., the embodiment described may include a specific feature, structure, or characteristic, but each embodiment may Or it may not necessarily include that specific feature, structure or characteristic. Moreover, these phrases do not necessarily refer to the same embodiment. In addition, when describing a specific feature, structure, or characteristic in conjunction with an embodiment, it should be considered that whether it is explicitly stated or not, it is within the knowledge of those skilled in the art to realize this feature, structure, or characteristic in combination with other embodiments. In addition, it should be understood that items in the form of "at least one of A, B, and C" included in a list can mean: (A); (B); (C); (A and B); (A and C); (B and C) or (A, B and C). Similarly, items listed in the form of "at least one of A, B or C" can mean: (A); (B); (C); (A and B); (A and C) ; (B and C) or (A, B and C). In the drawings, certain structural or method features can be displayed in a specific configuration and/or order. However, it should be understood that these specific configurations and/or sequences may not be required. Rather, in some embodiments, these features may be configured in a manner and/or order different from the manner and/or order shown in the illustrative drawings. In addition, the inclusion of a structural or method feature in a particular figure does not imply that this feature is required in all embodiments, and this feature can be included in some embodiments or can be combined with other features. Referring now to the drawings and, in particular, to FIG. 1, there is shown an exemplary environment in which a locking assembly 204 can operate in accordance with an embodiment of the present invention. A typical environment 100 may include a single residence 106. In other embodiments, the environment may include multiple residences in close proximity to each other, such as an apartment complex, one or more row houses, and/or commercial buildings. Generally, a residence can contain more than one access. For example, the residence 106 may include a front door 102, a side door 104, another door (not shown) located in the rear of the residence, a door (not shown) that enters from a garage, and/or others that provide an entrance/exit for the residence 106 door. One advantage of the lock assembly 204 is that it only needs to be installed on one of the doors while monitoring the other doors that provide an entrance/exit for the residence 106. Consider an example in which the lock assembly 204 is installed on the front door 102. Although a user 108 is shown using the side door 104 (which is one of the doors without the lock assembly 204) to leave the house 106, the user 108 can still be locked by the lock assembly on the front door 102 when leaving the house 106 from the side door 104 204 detected. As explained below, the lock assembly 204 can detect a user by wirelessly scanning an approaching device, such as a user carrying a wireless device (for example, a smart phone, a remote control key, etc.), the wireless device The detection is performed by the lock assembly 204 installed on the front door 102 using, for example, an integrated radio. For example purposes, the lock assembly 204 is shown to be installed on the front door 102, but the lock assembly 204 can be installed on any door in the residence 106. Referring now to FIG. 2, an exemplary system configuration 200 for synchronizing information is shown. In the example shown, the system includes a user device 202 that can receive the proximity device list information determined by the lock assembly 204 and from the lock assembly 204 via a network 206. The network 206 can be any type of network known to those skilled in the art, such as a local area network or the Internet. The lock assembly 204 may include a wireless communication module (see FIG. 7) that facilitates wireless communication with the user device 202 through a desired wireless communication protocol. In another embodiment, the user device 202 can use any desired protocol (such as Bluetooth™, Zigbee™ or Z-wave™) to directly synchronize with the lock assembly 204. Referring now to FIG. 3, there is shown an exemplary electronic lock 300 for mounting on a door 302 according to an embodiment of the present invention. The exemplary electronic lock includes an inner chassis 304, a removable cover 306, and a manual rotation. Plate 308, a bolt 310, a panel 312, user input 314, an external chassis 316, a mechanical locking assembly 318, and a removable key 320. The internal chassis 304 may contain electronic circuits for an integrated radio. The integrated radio may have the ability to scan one or more frequency bands for detection of proximity devices (such as smart phones, PDAs, remote keys, or the like). The integrated radio can usually use Bluetooth or Wi-Fi to scan for proximity devices. Design additional devices such as LEDs, switches, other integrated circuits, antennas and other devices into electronic circuits. The door lock assembly 204 can be installed on the outer part of the door, installed on the inside or a combination of external installation/internal installation. Figure 4 shows a simplified flow chart of an example of an integrated radio of the door hardware that performs a scan for a proximity device and compiles a list of detected devices. In this example, the method 400 starts by periodically scanning the device at block 402. The integrated radio can scan a frequency band or several frequency bands of interest, and record the unique signature of any other wireless devices in the same frequency band. In step 404, if no device is detected, the process restarts at block 402. If any device is detected, the process moves to step 406. In step 406, a list of one of the devices is created. For each device, the integrated radio can be assigned a unique identification code. It is also possible to classify each device with certain characteristics. These characteristics may include, but are not limited to, ID, name, range, detection time, dwell time, device type, and operating system. In some embodiments, the system tries to identify as many characteristics of the detected device as possible, especially in the case where one of the devices is an unknown device. These characteristics can be stored in a memory of the lock assembly 204 together with the device list. The device list can be stored in the memory of the lock assembly 204 for a specific period of time (such as 24 hours, a week, a month, or the like) to provide a history of a detected proximity device. The history can also be saved to a cloud server for access by the user device 202 at a later time. After determining the list, the process moves to step 408, and the list can be sent to a cloud server for synchronizing a user device (such as a user's smart phone). In another embodiment, when the user's device enters the specific proximity of the lock assembly 204, a near field communication protocol (for example, Bluetooth™, etc.) can be used to make the list communicate with a user的device synchronization. In step 410, the user can decide to create a notification after viewing the list of devices, which is described in further detail below in conjunction with FIG. 6. Figure 5 shows a simplified flow chart of one example of an alarm notification triggered based on the detection of certain devices. In this example, the method 500 starts with step 502 (receiving device list), which can be, for example, the list created in step 408 of FIG. 4. It can be received at a remote server or locally in the hardware of the lock assembly 204 itself. In step 504, the device list is analyzed based on user settings formed by a user, which will be described in further detail below with reference to FIG. 6. In step 506, the lock assembly 204 determines whether an alarm should be triggered for each device in the list. If no alarm is triggered, the program returns to the beginning. If an alarm is triggered, the program moves to step 510 and sends an appropriate alarm or notification. For example, a user may wish to be notified when his child's mobile phone is within the range of the lock assembly 204. Therefore, a user establishes a setting to be notified when a child's device is on the list of devices and can receive an appropriate notification (for example, SMS, text, email, etc.). In another exemplary embodiment, a user can choose to be notified whenever an unknown or new device is determined to be within the range of the lock hardware. Once it is determined that an unknown or new device is on the list, the user can be notified accordingly (for example, SMS, text, mail, etc.). Furthermore, the lock assembly 204 can communicate with a home automation system. Therefore, when the user can be notified of an unknown device, a command can also be triggered to the home automation system to lock all doors/windows or even close an open garage door. 6 is a simplified flowchart showing an example from a user's perspective using a user device that has a software application that interacts directly or indirectly with the lock assembly 204. In this example, the process 600 starts at step 602 and receives a device list, which can be viewed on one of the user's devices through a software application or "app". The device list basically represents the living state of a specific house, such as all the devices within the specific range of the house 106 in FIG. 1. In step 604, the user may decide to update or create settings to establish notifications and/or alarms that occur when a device is detected within a specific proximity of the lock assembly 204. If the user chooses not to make any changes, the procedure moves back to step 602. If the user chooses to make changes, the program moves to step 606 to update/form an alarm. As mentioned above, when certain devices are determined to be within the range of the lock hardware, the user can choose to receive certain notifications (for example, SMS, text, email). Other settings can also be established; for example, a specific area based on the size and proximity of a house, or command settings sent to a home automation system based on some detected devices. Once the settings are completed, the program moves to step 608 and saves the selected alarms/notifications. In step 610, the saved alarms/notifications can be synchronized with a cloud server and/or lock assembly 204. Referring now to FIG. 7, a simplified block diagram of an exemplary computing environment 700 for the lock assembly 204 in which the door lock application is executed is shown. The illustrative implementation 700 includes a lock assembly 204 that can communicate with one or more other computing systems or devices 742 via one or more networks 740. As shown, the lock assembly 204 includes a storage medium 720. The illustrative lock assembly 204 includes at least one processor 712 (eg, a microprocessor, microcontroller, digital signal processor, etc.), a memory 714, and an input/output (I/O) subsystem 716. Although not shown in detail, it should be understood that the I/O subsystem 716 may include, among other things, an I/O controller, a memory controller, and one or more I/O ports. The processor 712 and the I/O subsystem 716 are communicatively coupled to the memory 714. The memory 714 may be embodied as any type of suitable computer memory device (for example, volatile memory, such as various forms of random access memory). The I/O subsystem 716 is communicatively coupled to a number of components including one or more user input devices 718 (for example, a touch screen, keyboard, virtual keypad, microphone, etc.), one or more storage Media 720, one or more output devices 722 (for example, speakers, LEDs, etc.), one or more sensing devices 724, 726, 728, one or more cameras or other sensor applications 730 (for example, software-based Sensor control) and one or more network interfaces 732. The storage medium 720 may include one or more hard disk drives or other suitable data storage devices (for example, flash memory, memory card, memory stick, and/or other). In some embodiments, for faster processing or other reasons, part of the system software (for example, an operating system, etc.), framework/middle software (for example, API, target library Etc.), and part of the system software or framework/middle software is copied to the memory 714. One or more network interfaces 732 can communicatively couple the computing device 710 to a network, such as, for example, a local area network, a wide area network, a personal cloud, an enterprise cloud, a public cloud, and/or the Internet. Therefore, the network interface 732 may include one or more wired or wireless network interface cards or adapters, for example, as may be required according to the specifications and/or design of the specific computing system 700. The network interface 732 may use, for example, near field communication (NFC), wireless fidelity (Wi-Fi), radio frequency identification (RFID), infrared (IR) or other suitable technologies to provide short-range wireless or optical communication capabilities. Further, wireless communication can use Zigbee or Z-Wave protocol. The other computing system 742 may be embodied as any suitable type of computing system or device, such as any of the aforementioned types of devices or other electronic devices or systems. For example, in some embodiments, the other computing system 742 may include one or more server computers for storing part of the data stored in the storage medium 720. Further, the computing device 742 may further include an application program 744 to provide a display interface for a user to implement the stated embodiment of the present invention. For clarity of description, the computing system 700 may include other components, subcomponents, and devices that are not illustrated in FIG. 7. Generally speaking, the components of the computing system 700 are communicatively coupled through electronic signal paths (as shown in FIG. 7), and these electronic signal paths can be embodied as any one that can facilitate communication between individual devices and components. Type of wired or wireless signal path. Examples The following provides illustrative examples of the wireless locks with integrated wireless signals disclosed herein. An embodiment of a wireless lock may include any one or more and any combination of the examples set forth below. Example 1 includes an electronic lock system for use with a mobile device. The system includes a locking device that can move between a locked position and an unlocked position and an electronic lock with an integrated radio. The electronic lock is configured to: scan a proximity area for known devices and unknown devices, where the proximity area is a predefined area within the range of the electronic lock; determine the difference between the known devices and unknown devices in the proximity area A list; synchronize the list of known devices and unknown devices with the mobile device; and trigger one or more alarms based on the list of known devices and unknown devices. In Example 2, the subject matter of Example 1 is further configured to synchronize the proximity device list with the user device via the Internet. In Example 3, the subject matter of Example 1 is further configured to synchronize the proximity device list with the user device via Bluetooth. In Example 4, the subject matter of Example 1 is further configured so that the mobile device is configured to: receive the list of known devices and unknown devices; create or update user settings by a user of the mobile device, the Waiting for user settings to define alarms or notifications associated with one or more of the known devices and the unknown devices. In Example 5, the subject matter of Example 4 is further configured to classify each device with one or more characteristics, the one or more characteristics being an ID, name, range, detection time, dwell time, device type And operating system. In Example 6, the subject matter of Example 5 is further configured such that the one or more alarms triggered are further based on the user settings. In Example 7, the subject matter of Example 1 is further configured so that all the determined proximity devices are stored in a master list for a period of time. Example 8 is an electronic lock that includes at least one processor and a non-transitory computer medium, the non-transitory computer medium includes a plurality of instructions, and the plurality of instructions perform the following operations in response to being executed by the at least one processor: Known devices and unknown devices scan a proximity area, where the proximity area is a predefined area within the range of the electronic lock; determine a list of known devices and unknown devices in the proximity area; make known devices and unknown devices The list of devices is synchronized with the mobile device; and one or more alarms are triggered based on the list of known devices and unknown devices. In Example 9, the subject matter of Example 8 is further configured to synchronize the proximity device list with the user device via the Internet. In Example 10, the subject matter of Example 8 is further configured to synchronize the proximity device list with the user device via Bluetooth. In Example 11, the subject matter of Example 8 is further configured so that the instructions when executed by the processor further perform the following operations: the list of known devices and unknown devices; created by a user of the mobile device or Update, user settings define alarms or notifications associated with one or more of the known devices and the unknown devices. In Example 12, the subject matter of Example 11 is further configured to classify each device with one or more characteristics, which are an ID, name, range, detection time, dwell time, and device type And operating system. In Example 13, the subject matter of Example 12 is further configured such that the one or more alarms triggered are further based on user settings. In Example 14, the subject matter of Example 8 is further configured so that all the determined proximity devices are stored in a master list for a period of time. Example 15 is a method for determining a list of devices close to an electronic lock. The method includes the following steps: scanning a proximity area for the device, where the proximity area is a predefined area within the range of the electronic lock; determining a list of known devices and unknown devices in the proximity area; making known devices And the list of unknown devices is synchronized with the mobile device; and one or more alarms are triggered based on the list of known devices and unknown devices. In Example 16, the subject matter of Example 15 is further configured to synchronize the proximity device list with the user device via the Internet. In Example 17, the subject matter of Example 15 is further configured to synchronize the proximity device list with the user device via Bluetooth. In Example 18, the subject matter of Example 15 is further configured so that the method includes the following steps: receiving the list of known devices and unknown devices; and being created or updated by a user of the mobile device, user setting definitions and Alarms or notifications associated with one or more of the known devices and the unknown devices. In Example 19, the subject matter of Example 18 is further configured to classify each device with one or more characteristics, the one or more characteristics being an ID, name, range, detection time, dwell time, device type And operating system. In Example 20, the subject matter of Example 19 is further configured such that the one or more alarms triggered are further based on user settings. Although the present invention has been described with reference to specific components, materials, and embodiments, those skilled in the art can easily determine the basic characteristics of the present invention from the foregoing description and without departing from the scope of the present invention as set forth in the following patent applications Various changes and modifications are made in the spirit and scope to adapt to various uses and characteristics.

100‧‧‧典型環境102‧‧‧前門104‧‧‧側門106‧‧‧住宅108‧‧‧使用者200‧‧‧實例性系統組態202‧‧‧使用者裝置204‧‧‧鎖定總成/鎖總成/門鎖總成/說明性鎖總成206‧‧‧網路300‧‧‧實例性電子鎖302‧‧‧門304‧‧‧內部底盤306‧‧‧可移除蓋308‧‧‧手動轉動片310‧‧‧螺栓312‧‧‧面板314‧‧‧使用者輸入316‧‧‧外部底盤318‧‧‧機械鎖定總成320‧‧‧可移除鑰匙700‧‧‧例示性計算環境/說明性實施方案/計算系統712‧‧‧處理器714‧‧‧記憶體716‧‧‧輸入/輸出子系統718‧‧‧使用者輸入裝置720‧‧‧儲存媒體722‧‧‧輸出裝置724‧‧‧感測裝置726‧‧‧感測裝置728‧‧‧感測裝置730‧‧‧感測器應用程式732‧‧‧網路介面740‧‧‧網路742‧‧‧計算系統/計算裝置744‧‧‧應用程式100‧‧‧Typical environment 102‧‧‧Front door 104‧‧‧Side door 106‧‧‧House 108‧‧‧User 200‧‧‧Example system configuration 202‧‧‧User device 204‧‧‧Lock assembly /Lock assembly/Door lock assembly/Descriptive lock assembly 206‧‧‧Network 300‧‧Example electronic lock 302‧‧‧Door 304‧‧‧Internal chassis 306‧‧‧Removable cover 308‧ ‧‧Manually rotating piece 310‧‧‧Bolt 312‧‧‧Panel 314‧‧‧User input 316‧‧‧External chassis 318‧‧‧Mechanical locking assembly 320‧‧‧Removable key 700‧‧‧Exemplary Computing environment/illustrative implementation/computing system 712‧‧‧processor 714‧‧‧memory 716‧‧‧input/output subsystem 718‧‧‧user input device 720‧‧‧storage media 722‧‧‧output Device 724‧‧‧Sensing device 726‧‧‧Sensing device 728‧‧‧Sensing device 730‧‧‧Sensor application 732‧‧‧Network interface 740‧‧‧Network 742‧‧‧Computer system /Computer 744‧‧‧Application

詳細說明參考附圖,在該等附圖中: 圖1係其中一鎖總成可根據本發明之一項實施例操作之一例示性環境; 圖2係根據本發明之一實施例之用於判定在鎖總成之範圍內之接近裝置之一實例性系統之一經簡化方塊圖; 圖3係根據本發明之一實施例之安裝於一門上且其中該門以虛線展示之一電子鎖總成及對應硬體之一側視圖; 圖4係根據本發明之一實施例之用於判定鎖硬體之一接近範圍內之裝置之一清單之一實例性方法之一流程圖; 圖5係根據本發明之一實施例之用於基於預定義使用者設定而觸發警報通知之一實例性方法之一流程圖; 圖6係根據本發明之一實施例之用於一使用者接收裝置之一清單且建立用於警報通知之使用者設定之一實例性方法之一流程圖;且 圖7係結合圖1之鎖總成之至少一項實施例之一例示性計算環境之一經簡化方塊圖。Detailed description refers to the accompanying drawings, in which: Figure 1 is an exemplary environment in which a lock assembly can be operated according to an embodiment of the present invention; Figure 2 is an exemplary environment according to an embodiment of the present invention A simplified block diagram of an exemplary system for determining the proximity device within the range of the lock assembly; FIG. 3 is an electronic lock assembly installed on a door according to an embodiment of the present invention, wherein the door shows an electronic lock assembly in dashed lines And a side view of the corresponding hardware; Fig. 4 is a flowchart of an exemplary method for determining a list of devices within the proximity of a lock hardware according to an embodiment of the present invention; Fig. 5 is based on A flowchart of an exemplary method for triggering an alarm notification based on a predefined user setting according to an embodiment of the present invention; FIG. 6 is a list of a receiving device for a user according to an embodiment of the present invention And establish a flow chart of an exemplary method for user settings for alarm notification; and FIG. 7 is a simplified block diagram of an exemplary computing environment in conjunction with at least one embodiment of the lock assembly of FIG. 1.

300‧‧‧實例性電子鎖 300‧‧‧Example electronic lock

302‧‧‧門 Door 302‧‧‧

304‧‧‧內部底盤 304‧‧‧Internal chassis

306‧‧‧可移除蓋 306‧‧‧Removable cover

308‧‧‧手動轉動片 308‧‧‧Manually rotating plate

310‧‧‧螺栓 310‧‧‧Bolt

312‧‧‧面板 312‧‧‧Panel

314‧‧‧使用者輸入 314‧‧‧User input

316‧‧‧外部底盤 316‧‧‧External chassis

318‧‧‧機械鎖定總成 318‧‧‧Mechanical locking assembly

320‧‧‧可移除鑰匙 320‧‧‧Removable key

Claims (20)

一種包括供與一行動裝置配合使用之一電子鎖之系統,該系統包括: 一鎖定裝置,其可在一鎖定位置與一解鎖位置之間移動; 該電子鎖,其包括一整合無線電,該電子鎖經組態以: 針對已知裝置及未知裝置掃描一接近區域,其中該接近區域係該電子鎖之範圍內之一預定義區域; 判定該接近區域內之已知裝置及未知裝置之一清單; 使已知裝置及未知裝置之該清單與該行動裝置同步;及 基於已知裝置及未知裝置之該清單而觸發一或多個警報。A system including an electronic lock for use with a mobile device. The system includes: a locking device that can move between a locked position and an unlocked position; the electronic lock includes an integrated radio, the electronic The lock is configured to: scan a proximity area for known devices and unknown devices, where the proximity area is a predefined area within the range of the electronic lock; determine a list of known devices and unknown devices in the proximity area ; Synchronize the list of known devices and unknown devices with the mobile device; and trigger one or more alarms based on the list of known devices and unknown devices. 如請求項1之系統,其中經由網際網路而使該接近裝置清單與該行動裝置同步。Such as the system of claim 1, wherein the proximity device list is synchronized with the mobile device via the Internet. 如請求項1之系統,其中經由藍芽而使該接近裝置清單與該行動裝置同步。Such as the system of claim 1, wherein the proximity device list is synchronized with the mobile device via Bluetooth. 如請求項1之系統,其中該行動裝置經組態以: 接收已知裝置及未知裝置之該清單; 由該行動裝置之一使用者建立或更新使用者設定,該等使用者設定定義與該等已知裝置及該等未知裝置中之一或多者相關聯之警報或通知。Such as the system of claim 1, in which the mobile device is configured to: receive the list of known devices and unknown devices; create or update user settings by a user of the mobile device, and the user setting definitions are consistent with the Alarms or notifications associated with known devices and one or more of these unknown devices. 如請求項4之系統,其中以一或多個特性將每一裝置分類,該一或多個特性係一ID、名稱、範圍、偵測時間、停留時間、裝置類型及作業系統。For example, in the system of claim 4, each device is classified by one or more characteristics. The one or more characteristics are an ID, name, range, detection time, dwell time, device type, and operating system. 如請求項5之系統,其中所觸發之該一或多個警報進一步基於該等使用者設定。Such as the system of claim 5, wherein the one or more alarms triggered are further based on the user settings. 如請求項1之系統,其中將所有所判定之接近裝置儲存於一主清單中達一時間週期。Such as the system of claim 1, in which all the determined proximity devices are stored in a master list for a period of time. 一種電子鎖,其包括至少一個處理器及一非暫時性電腦媒體,該非暫時性電腦媒體包括複數個指令,該複數個指令回應於由該至少一個處理器執行而執行以下操作: 針對已知裝置及未知裝置掃描一接近區域,其中該接近區域係該電子鎖之範圍內之一預定義區域; 判定該接近區域內之已知裝置及未知裝置之一清單; 使已知裝置及未知裝置之該清單與一行動裝置同步;及 基於已知裝置及未知裝置之該清單而觸發一或多個警報。An electronic lock includes at least one processor and a non-transitory computer medium, the non-transitory computer medium includes a plurality of instructions, and the plurality of instructions perform the following operations in response to being executed by the at least one processor: for a known device And unknown devices scan a proximity area, where the proximity area is a predefined area within the range of the electronic lock; determine a list of known devices and unknown devices in the proximity area; make the known device and the unknown device The list is synchronized with a mobile device; and one or more alarms are triggered based on the list of known devices and unknown devices. 如請求項8之電子鎖,其中經由網際網路而使該接近裝置清單與該行動裝置同步。For example, the electronic lock of claim 8, wherein the proximity device list is synchronized with the mobile device via the Internet. 如請求項8之電子鎖,其中經由藍芽而使該接近裝置清單與該行動裝置同步。For example, the electronic lock of claim 8, wherein the proximity device list is synchronized with the mobile device via Bluetooth. 如請求項8之電子鎖,其中該等指令在由該處理器執行時進一步執行以下操作: 接收已知裝置及未知裝置之該清單; 由該行動裝置之一使用者建立或更新,使用者設定定義與該等已知裝置及該等未知裝置中之一或多者相關聯之警報或通知。For example, the electronic lock of claim 8, wherein the instructions further perform the following operations when executed by the processor: receive the list of known devices and unknown devices; created or updated by a user of the mobile device, and set by the user Define alarms or notifications associated with one or more of the known devices and the unknown devices. 如請求項11之電子鎖,其中以一或多個特性將每一裝置分類,該一或多個特性係一ID、名稱、範圍、偵測時間、停留時間、裝置類型及作業系統。For example, the electronic lock of claim 11, in which each device is classified by one or more characteristics, and the one or more characteristics are an ID, name, range, detection time, stay time, device type, and operating system. 如請求項12之電子鎖,其中所觸發之該一或多個警報進一步基於使用者設定。Such as the electronic lock of claim 12, wherein the one or more alarms triggered are further based on user settings. 如請求項8之電子鎖,其中將所有所判定之接近裝置儲存於一主清單中達一時間週期。For example, the electronic lock of claim 8, in which all the determined proximity devices are stored in a master list for a period of time. 一種用於判定接近於一電子鎖之裝置之一清單之方法,該方法包括: 針對裝置掃描一接近區域,其中該接近區域係該電子鎖之範圍內之一預定義區域; 判定該接近區域內之已知裝置及未知裝置之一清單; 使已知裝置及未知裝置之該清單與一行動裝置同步;及 基於已知裝置及未知裝置之該清單而觸發一或多個警報。A method for determining a list of devices close to an electronic lock, the method comprising: scanning a proximity area for the device, wherein the proximity area is a predefined area within the range of the electronic lock; determining within the proximity area A list of known devices and unknown devices; synchronize the list of known devices and unknown devices with a mobile device; and trigger one or more alarms based on the list of known devices and unknown devices. 如請求項15之方法,其中經由網際網路而使該接近裝置清單與該行動裝置同步。Such as the method of claim 15, wherein the proximity device list is synchronized with the mobile device via the Internet. 如請求項15之方法,其中經由藍芽而使該接近裝置清單與該行動裝置同步。Such as the method of claim 15, wherein the proximity device list is synchronized with the mobile device via Bluetooth. 如請求項15之方法,其進一步包括: 接收已知裝置及未知裝置之該清單; 由該行動裝置之一使用者建立或更新,使用者設定定義與該等已知裝置及該等未知裝置中之一或多者相關聯之警報或通知。For example, the method of claim 15, which further includes: receiving the list of known devices and unknown devices; created or updated by a user of the mobile device, the user setting definition is related to the known devices and the unknown devices One or more associated alarms or notifications. 如請求項18之方法,其中以一或多個特性將每一裝置分類,該一或多個特性係一ID、名稱、範圍、偵測時間、停留時間、裝置類型及作業系統。Such as the method of claim 18, in which each device is classified by one or more characteristics, and the one or more characteristics are an ID, name, range, detection time, dwell time, device type, and operating system. 如請求項19之方法,其中所觸發之該一或多個警報進一步基於使用者設定。The method of claim 19, wherein the one or more alarms triggered are further based on user settings.
TW106113083A 2016-04-19 2017-04-19 Lockset with integrated wireless signals analysis feature and method TWI745368B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201662324484P 2016-04-19 2016-04-19
US62/324,484 2016-04-19

Publications (2)

Publication Number Publication Date
TW201742977A TW201742977A (en) 2017-12-16
TWI745368B true TWI745368B (en) 2021-11-11

Family

ID=60116998

Family Applications (1)

Application Number Title Priority Date Filing Date
TW106113083A TWI745368B (en) 2016-04-19 2017-04-19 Lockset with integrated wireless signals analysis feature and method

Country Status (3)

Country Link
US (1) US10930097B2 (en)
TW (1) TWI745368B (en)
WO (1) WO2017184513A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11639617B1 (en) 2019-04-03 2023-05-02 The Chamberlain Group Llc Access control system and method
US11821236B1 (en) 2021-07-16 2023-11-21 Apad Access, Inc. Systems, methods, and devices for electronic dynamic lock assembly
USD1092534S1 (en) * 2022-04-27 2025-09-09 Genetec Inc. Display screen or portion thereof with transitional graphical user interface

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100283579A1 (en) * 2007-12-31 2010-11-11 Schlage Lock Company Method and system for remotely controlling access to an access point
US20140051355A1 (en) * 2012-08-16 2014-02-20 Schlage Lock Company Llc Wireless electronic lock system and method
TW201422890A (en) * 2012-12-03 2014-06-16 Univ Shu Te Method for utilizing ultrasound to complete the remote unlocking

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE534135C2 (en) * 2009-09-17 2011-05-10 Phoniro Ab Distribution of lock access data for electromechanical locks in an access control system
US8325033B2 (en) * 2009-09-25 2012-12-04 At&T Intellectual Property I, L.P. Systems and methods for remote building security and automation
KR101256920B1 (en) 2010-12-28 2013-05-02 주식회사 지오아이티 the door lock system of both access management and security system and the door lock operation system using thereof
US9336637B2 (en) 2011-03-17 2016-05-10 Unikey Technologies Inc. Wireless access control system and related methods
US10075334B1 (en) * 2012-04-11 2018-09-11 Google Llc Systems and methods for commissioning a smart hub device
US9800429B2 (en) * 2013-03-15 2017-10-24 Smartbotics Inc. Adaptive home and commercial automation devices, methods and systems based on the proximity of controlling elements
KR102038746B1 (en) 2013-03-15 2019-10-30 스펙트럼 브랜즈, 인크. Wireless lockset with integrated antenna, touch activation, and light communication device
CA3158668A1 (en) * 2014-12-30 2016-07-07 Alarm.Com Incorporated Digital fingerprint tracking
US9210534B1 (en) * 2015-02-19 2015-12-08 Citrix Systems, Inc. Location assistance in a machine to machine instant messaging system
US9396599B1 (en) * 2015-05-29 2016-07-19 Google Inc. Systems and methods for anticipatory locking and unlocking of a smart-sensor door lock
US10051003B2 (en) * 2015-07-30 2018-08-14 Apple Inc. Privacy enhancements for wireless devices
CN105450655B (en) * 2015-12-14 2019-05-28 小米科技有限责任公司 Apparatus bound method and apparatus
US10028087B2 (en) * 2016-04-04 2018-07-17 Ricoh Company, Ltd. Locating and tracking missing or relocated devices
US9854445B1 (en) * 2017-01-24 2017-12-26 International Business Machines Corporation Domain-aware device protection via cross-validation among spatially-adjacent devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100283579A1 (en) * 2007-12-31 2010-11-11 Schlage Lock Company Method and system for remotely controlling access to an access point
US20140051355A1 (en) * 2012-08-16 2014-02-20 Schlage Lock Company Llc Wireless electronic lock system and method
TW201422890A (en) * 2012-12-03 2014-06-16 Univ Shu Te Method for utilizing ultrasound to complete the remote unlocking

Also Published As

Publication number Publication date
WO2017184513A1 (en) 2017-10-26
US10930097B2 (en) 2021-02-23
US20190122465A1 (en) 2019-04-25
CA3021265A1 (en) 2017-10-26
TW201742977A (en) 2017-12-16

Similar Documents

Publication Publication Date Title
US10731380B2 (en) Electronic lock with door orientation sensing
US11952799B2 (en) Wireless lockset with integrated angle of arrival (AoA) detection
US9940821B2 (en) Systems and methods of privacy within a security system
US10049520B2 (en) Access system with persistent display
US10083596B2 (en) Systems and methods of automated arming and disarming of a security system
EP2974255A1 (en) Electronic lock with remote monitoring
KR102353322B1 (en) System for controlling entrance based on beacon and Method thereof
KR20240169137A (en) Determination of user presence and absence using wifi
US10679111B2 (en) Passive RFID door lock
US11620865B2 (en) Access control in a multi-tenant environment
US20150308178A1 (en) Sensors indicating from which side a barrier is accessed
TWI745368B (en) Lockset with integrated wireless signals analysis feature and method
KR102367696B1 (en) Door lock device and method of operating thereof
CA3021265C (en) Lockset with integrated wireless signals analysis feature and method
KR102417594B1 (en) System of push service through access events
TWI737755B (en) Passive rfid door lock, electronic door lock system and operation method thereof
US11776337B1 (en) Multi-locking mechanisms for premises security systems
JP7475267B2 (en) Security system
WO2025197321A1 (en) Home system, server, owner authentication method, and owner authentication program